{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:34:49Z","timestamp":1729668889615,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,8]]},"DOI":"10.1109\/imsccs.2007.44","type":"proceedings-article","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T13:03:24Z","timestamp":1209387804000},"page":"387-390","source":"Crossref","is-referenced-by-count":1,"title":["A method to enhance service survivability based on autonomous configuration"],"prefix":"10.1109","author":[{"given":"Lejun","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Wu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Yongtian","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"3"},{"key":"2","article-title":"Survivable computer-communication systems: The problem and working group recommendations","author":"hollway","year":"1993","journal-title":"Washington"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1360\/crad20060910"},{"key":"1","first-page":"124","article-title":"Analysis on characters of survivability and emergent algorithms","author":"zhang","year":"2005","journal-title":"Journal of China Institute of Communication"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/508171.508177"},{"key":"6","article-title":"Life-cycle models for survivable systems","author":"richard","year":"2002","journal-title":"Sledge CMU\/SEI"},{"key":"5","article-title":"Survivability architectures: Issues and approaches","author":"knight","year":"2006","journal-title":"EB\/OL]"},{"key":"4","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/4236.807008","article-title":"Survivability: Protecting Your Critical Systems","volume":"3","author":"fisher","year":"1999","journal-title":"Internet Computing"},{"key":"9","first-page":"759","article-title":"Self-organizing paradigm for NTP autonomous configuration","volume":"28","author":"bao","year":"2005","journal-title":"Chinese Journal of Computer"},{"key":"8","first-page":"137","article-title":"The survivability technique and its implementation caste study","volume":"25","author":"huang","year":"2004","journal-title":"Journal of China Institute of Communication"},{"journal-title":"Introduction to Reliability Engineering","year":"1987","author":"lewis","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2003.1205979"}],"event":{"name":"Second International Multi-Symposiums on Computer and Computational Sciences (IMSCCS 2007)","start":{"date-parts":[[2007,8,13]]},"location":"Iowa City, IA, USA","end":{"date-parts":[[2007,8,15]]}},"container-title":["Second International Multi-Symposiums on Computer and Computational Sciences (IMSCCS 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4392565\/4392566\/04392630.pdf?arnumber=4392630","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T03:30:17Z","timestamp":1497756617000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4392630\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,8]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/imsccs.2007.44","relation":{},"subject":[],"published":{"date-parts":[[2007,8]]}}}